Network Security Hacks [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Hacks [Electronic resources] - نسخه متنی

Andrew Lockhart

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید







Hack 66 Sniff the Ether Remotely

Monitor your networks remotely with
rpcapd.



If
you've ever wanted to monitor network traffic from
another segment and use a graphical protocol analyzer like
Ethereal (http://www.ethereal.com), you know how
time-consuming it can be. First you
have to capture the data. Then you
have to get it onto the workstation that you're
running the analyzer from, and then you have to load the file into
the analyzer itself. This creates a
real problem because it increases the time between performing an
experiment and seeing the results, which makes diagnosing and fixing
network problems take much longer than they should.

One tool that solves this problem is rpcapd, a
program included with WinPcap (http://winpcap.polito.it). rpcapd is a daemon that
monitors network interfaces in promiscuous mode and sends the data
that it collects back to a sniffer running on a remote
machine. You can run
rpcapd either from the command line or as a
service. To start
rpcapd, you will probably want to use the
-n flag, which tells the daemon to use null
authentication. Using this option,
you will be able to monitor the data stream that rpcapd
produces with any program that uses the WinPcap capture
interface. Otherwise, special code will have to be added to the
program that you are using that will allow it to authenticate itself
with rpcapd.
Since the -n option allows anyone to
connect to the daemon, you'll also want to use the
-l option, which allows you to specify a
comma-separated list of hosts that can connect.

So, to run rpcapd from the command line, use a
command similar to this:

C:\Program Files\WinPcap>rpcapd -l obsidian -n
Press CTRL + C to stop the server...

When run as a service, rpcapd uses the
rpcapd.ini file for its configuration
information. This file resides in
the same directory as the executable and is easily created by running
rpcapd with the -s switch,
which instructs rpcapd to save its configuration
to the file you specify.

To create a pcap.ini, run a command like this:

C:\Program Files\WinPcap>rpcapd -l obsidian -n -s rpcapd.ini
Press CTRL + C to stop the server...

Now press Ctrl-C and see what the file contains:

C:\Program Files\WinPcap>type rpcapd.ini
# Configuration file help.
# Hosts which are allowed to connect to this server (passive mode)
# Format: PassiveClient = <name or address>
PassiveClient = obsidian
# Hosts to which this server is trying to connect to (active mode)
# Format: ActiveClient = <name or address>, <port | DEFAULT>
# Permit NULL authentication: YES or NOT
NullAuthPermit = YES

To start the service, you can either use the Services control panel
applet or use the net command from the command
line:

C:\Program Files\WinPcap>net start rpcapd
The Remote Packet Capture Protocol v.0 (experimental) service was started
successfully.

Now, to connect to the daemon you will need to find out the name that
WinPcap uses to refer to the network device you want to
monitor. To do this, you can use
either WinDump, a command-line
packet
sniffer for Windows, or Ethereal.
WinDump is available from the same web site as
WinPcap.

To get the device name with WinDump simply run it with the
-D flag:

C:\Program Files\WinPcap>windump -D
1.\Device\NPF_{EE07A5AE-4D19-4118-97CE-3BF656CD718F} (NDIS 5.0 driver)

You can use Ethereal to obtain the device name by starting up
Ethereal, going to the Capture menu, and clicking Start. After you do that, a dialog will open that
has a list of the available adapters on the system, much like the one
seen in Figure 5-4.
The device names in the list are those that you will later
specify when connecting to rpcapd from a remote
system.


Figure 5-4. Ethereal Capture Options dialog



When you connect to a remote machine with your favorite sniffer,
simply put the device name for the interface you want to monitor
prefixed by rpcap and the hostname, like this:

rpcap://plunder/\Device\NPF_{EE07A5AE-4D19-4118-97CE-3BF656CD718F}

You can see an example of this with Ethereal in Figure 5-5.


Figure 5-5. Using a remote capture source with Ethereal



If you've set up everything correctly, you should
see traffic streaming from the remote end into your sniffer just as
if it were being captured from a local interface.


/ 158